<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Encrypting Passwords in Scripts:  The Ultimate Best Practice Guide for Powershell	</title>
	<atom:link href="https://thesysadminchannel.com/passwords-in-scripts-the-ultimate-best-practice-guide/feed/" rel="self" type="application/rss+xml" />
	<link>https://thesysadminchannel.com/passwords-in-scripts-the-ultimate-best-practice-guide/</link>
	<description>Documenting My Life as a System Administrator</description>
	<lastBuildDate>Mon, 12 Dec 2022 10:22:31 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>
		By: Anon		</title>
		<link>https://thesysadminchannel.com/passwords-in-scripts-the-ultimate-best-practice-guide/#comment-6591</link>

		<dc:creator><![CDATA[Anon]]></dc:creator>
		<pubDate>Mon, 12 Dec 2022 10:22:31 +0000</pubDate>
		<guid isPermaLink="false">https://thesysadminchannel.com/?p=431#comment-6591</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://thesysadminchannel.com/passwords-in-scripts-the-ultimate-best-practice-guide/#comment-1705&quot;&gt;pepo&lt;/a&gt;.

@Pepo

Except that the password is stored as a secure string (In this case, generated by Get-Credential) which can only be decoded by the Windows account that made it (So you need the secure string, access to his account, and I may be wrong on this part, but the computer it was created on).

Hence why he says he has to regenerate it every 3 months when he changes his password.

While you definitely, wouldn&#039;t opt for something like this in a corporate environment (You would go with more secure methods like certificates for example) this isn&#039;t a terrible way for people at home who want to run some scheduled scripts that require credentials while avoiding plain text.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://thesysadminchannel.com/passwords-in-scripts-the-ultimate-best-practice-guide/#comment-1705">pepo</a>.</p>
<p>@Pepo</p>
<p>Except that the password is stored as a secure string (In this case, generated by Get-Credential) which can only be decoded by the Windows account that made it (So you need the secure string, access to his account, and I may be wrong on this part, but the computer it was created on).</p>
<p>Hence why he says he has to regenerate it every 3 months when he changes his password.</p>
<p>While you definitely, wouldn&#8217;t opt for something like this in a corporate environment (You would go with more secure methods like certificates for example) this isn&#8217;t a terrible way for people at home who want to run some scheduled scripts that require credentials while avoiding plain text.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: pepo		</title>
		<link>https://thesysadminchannel.com/passwords-in-scripts-the-ultimate-best-practice-guide/#comment-1705</link>

		<dc:creator><![CDATA[pepo]]></dc:creator>
		<pubDate>Sat, 09 Jul 2022 22:24:11 +0000</pubDate>
		<guid isPermaLink="false">https://thesysadminchannel.com/?p=431#comment-1705</guid>

					<description><![CDATA[This is super funny since powershell is open source, a script.
So having the password encrypted in some file and decrypting it into a string in the script itself, whoever wants to get it just needs to edit the script and echo the variable in the script itself instead of just passing it, unless you encrypt the script itself which i havent seen done since its open source.
The best solution would be to not store passwords in any open source easily edited script.
It should be coded in c++ or something similar and than encrypted in case you must have the password passed in plain text.
Will be harder for the attacker to obtain.]]></description>
			<content:encoded><![CDATA[<p>This is super funny since powershell is open source, a script.<br />
So having the password encrypted in some file and decrypting it into a string in the script itself, whoever wants to get it just needs to edit the script and echo the variable in the script itself instead of just passing it, unless you encrypt the script itself which i havent seen done since its open source.<br />
The best solution would be to not store passwords in any open source easily edited script.<br />
It should be coded in c++ or something similar and than encrypted in case you must have the password passed in plain text.<br />
Will be harder for the attacker to obtain.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
